Skip to main content

HOPE - H2K Video

Movies Preview

HOPE - H2K Video

Published 2002

H2K2 (2002)
Hackers on Planet Earth

H2K2 (2002): A Day in the Life of a Directory Assistance Operator
Friday, July 12, 2002: 10:00 am (Area "A"): Odds are most of us take things about the phone companies for granted. But there is a whole world that we don't see which is always operating. Hear how the system really works from The Cheshire Catalyst.

H2K2 (2002): Standing Up To Authority
Friday, July 12, 2002: 11:00 am (Area "A"): "How is it you folks have gotten away with not getting shut down by the powers-that-be?" is the question most frequently asked of Cryptome ( since its inception in 1996. Post-9/11 H2K2 is an opportune time and place to reconsider implications of this question with Cryptome founders John Young and Deborah Natsios, New York City-based architects (of bricks and mortar), who will discuss their means and methods of sustaining activism in the face of opposition, with reference to ongoing cases.

H2K2 (2002): RetroComputing
Friday, July 12, 2002: 12:00 pm (Area "A"): This year's retrocomputing panel will focus on hardware hacking and cloning such systems as the Apple ][ and C64. Also included will be a discussion on homebrew microcomputers and kits from the 70's as well as antique cellphone hacking. Witness firsthand genuine pieces of history. Attendees are encouraged to bring their really old (working) computers for the "retrocomputer neighborhood" in the network room.

Hosted by Mr. Ohm, Sam Nitzberg, Cheshire Catalyst, and Bernie S.

H2K2 (2002): Keynote - Siva Vaidhyanathan
"Life in a Distributed Age"

Friday, July 12, 2002: 1:00 pm (Area "A"): Distributed information systems of all kinds are challenging cultural and political assumptions. The moral of the story is that whether we like it or not, it's time to take anarchy seriously. We have spent the past 200 years thinking centralization of power and information was the greatest challenge to republican forms of government and corporatized commerce. But now, it should be clear, decentralization and encryption have emerged as the most important dynamics of power.

H2K2 (2002): Steganography: Wild Rumors and Practical Applications
Friday, July 12, 2002: 2:00 pm (Area "A"): Is Osama bin Laden sending coded messages in the pictures of goods for sale on EBay? Is that MP3 file carrying a secret note that tracks the listeners? Steganography is the art and science of hiding information in digital data and it stretches the boundaries of information theory and philosophy. An artful programmer can hide secret messages in such a way that a 1 is not always a 1 and a 0 is not always a 0. This talk will explore some of the popular schemes for inserting messages and discuss how they're used by hackers, poets, corporate bean counters, and programmers on a deadline.

Hosted by Peter Wayner

H2K2 (2002): Fucking Up the Internet at ICANN: Global Control Through the Domain Name System
Friday, July 12, 2002: 3:00 pm (Area "A"): Did you know that the entire Internet domain structure is controlled by a mysterious group called the Internet Corporation for Assigned Names and Numbers (ICANN)? Andy Mueller-Maguhn, longtime member and spokesman of Germany's Chaos Computer Club and currently elected from European users to be on the board of ICANN, will explain the latest developments at ICANN and how the mixture of intellectual property and governmental interests affects the freedom of the Internet. Paul Garrin, founder of and FREE.THE.MEDIA!, will talk about his initiatives to establish rights to access to the legacy ROOT.ZONE, from the historical antitrust action against Network Solutions in 1997 through the US Department of Commerce's IFWP process (the predecessor to ICANN), and Name.Space's $50,000.00 TLD application to ICANN in 2000 (ICANN kept the money and took three TLD's previously published by Name.Space). The question is raised: Is there hope for seeking fair access to the legacy ROOT.ZONE through due process or is it time to treat ICANN as "damage" and route around it?

H2K2 (2002): The DeCSS Story
Friday, July 12, 2002: 4:00 pm (Area "A"): At our last conference, we were preparing to go on trial for daring to have the code to DeCSS on our web site. Quite a lot has happened since then. The public perception of entities like the MPAA and the RIAA has gone down the toilet as their true motives became apparent. We were the first in what will be a long line of courtroom battles to defend freedom of speech, fair use, and open source technology. While we lost the case and the subsequent appeal, we still somehow feel victorious. Find out why.

Hosted by Emmanuel Goldstein, Robin Gross, and Macki

H2K2 (2002): Fun With 802.11b
Friday, July 12, 2002: 5:00 pm (Area "A"): Would you be surprised if you could turn on your laptop anywhere in the city and find yourself on someone else's network? How about if you were able to connect to the Internet? Or see someone's private data go flying by? It's all possible and it happens all the time - all over the country. This panel will cover 802.11 wireless ethernet networking basics, as well as detecting and monitoring wireless networks with active and passive methods. Community free networks, custom antennas, and methods of securing wireless networks will also be covered.

Hosted by dragorn, Porkchop, and StAtIc FuSiOn

H2K2 (2002): LPFM Basics
Friday, July 12, 2002: 6:00 pm (Area "A"): Learn exactly how to navigate the LPFM licensing process. Pete Tridish of the Prometheus Radio Project will present background about the fight for community radio and explain the absurd technical limitations placed on low-power community FM radio stations by powerful corporate interests.

H2K2 (2002): The Vanished Art of Human Intelligence
Friday, July 12, 2002: 7:00 pm (Area "A"): A collection of videos and analysis by WBAI talk show host and 25 year federal agent Mike Levine. Learn about the dangers of the use of human intelligence in the hands of amateurs and imagine what is about to happen under the new anti-terrorism laws.

H2K2 (2002): The New FBI and How It Can Hurt You
Friday, July 12, 2002: 9:00 pm (Area "A"): On May 29, the Federal Bureau of Investigation dramatically changed its focus. Now, instead of investigating crimes, its mission is to prevent them, meaning they have virtual carte blanche to infiltrate any law abiding organization or gathering to make sure all is right. And, even better, their third priority of dangerous crimes to stop (next to terrorism and espionage) is "cybercrime." We all know what a wide net that can be. Hear the dangers firsthand from the people who follow this kind of thing.

Hosted by Mike Levine, Declan McCullagh, and Robert Steele

H2K2 (2002): The Ins and Outs of Webcasting
Saturday, July 13, 2002: 10:00 am (Area "A"): While the airwaves have been almost completely taken over by corporate interests, there is a whole world of broadcasting on the Internet just waiting for creative minds. Find out what it takes to get an Internet station going and what kinds of creative programming are possible. Also, learn what the recently mandated RIAA licensing fees will mean to the future of this broadcasting medium.

Hosted by Lynea Diaz-Hagan, Tarikh Korula, Lazlow, and Kevin Prichard

H2K2 (2002): DMCA Legal Update
Saturday, July 13, 2002: 11:00 am (Area "A"): Since we last met, the Digital Millennium Copyright Act has claimed more victims and been at the forefront of all kinds of legal action. We even had the first instance of a programmer being thrown into prison because of a program he wrote while in his native Russia! Hear the latest on the Dmitry Sklyarov case and others that the DMCA is responsible for as well as what is being done to put an end to it.

Hosted by Eric Grimm and Robin Gross

H2K2 (2002): Educating Lawmakers - Is It Possible?
Saturday, July 13, 2002: 12:00 pm (Area "A"): Trying to educate Congress about technology is approximately as useful as teaching a pig to type. It doesn't work and you get one peeved pig. But there are sometimes ways to make a difference in law and policy circles without becoming a wholly owned tool of the Demopublican Party. A discussion with journalist Declan McCullagh and cryptologist Matt Blaze.

H2K2 (2002): Keynote - Aaron McGruder
Saturday, July 13, 2002: 1:00 pm (Area "A"): Just about everyone has at one time or another read the daily comic strip "The Boondocks." Not everyone has appreciated it. In fact, it's generated a share of controversy among the mainstream for its "alternative" views. In addition, McGruder has devoted space to hacker issues, most notably the DeCSS case - which was presented accurately for probably the first time in most of the papers his strip appears in. McGruder is one of those rare individuals with access to the mainstream who actually "gets" the technical issues. Needless to say, he has been targeted relentlessly by censors for daring to speak his mind. Sound familiar?

H2K2 (2002): Databases and Privacy
Saturday, July 13, 2002: 2:00 pm (Area "A"): Once again, world renowned private eye Steve Rambam will enlighten and frighten attendees with the latest updates on the personal information that is out there about each and every one of us. Find out which databases contain the most invasive information and who has access to them, as well as what you can do to protect your privacy. There will also be a discussion on truth and accountability on the net as well as live demonstrations.

H2K2 (2002): "The Conscience of a Hacker"
Saturday, July 13, 2002: 3:00 pm (Area "A"): Probably the most famous single essay about what it's like to be a hacker is "The Conscience of a Hacker" by The Mentor, written in 1986. It's been quoted all over the place, including the movie "Hackers." It remains one of the most inspirational pieces written about the hacker community and it's survived well over time. This year, we're pleased to have The Mentor himself give a reading of it and offer additional insight.

H2K2 (2002): Making Money on the Internet While Still Saying "Fuck"
Saturday, July 13, 2002: 5:00 pm (Area "A"): Pud of will speak about his experiences setting up and maintaining a popular Web site for corporate rumors. How does he handle confidentiality of rumor-mongers, avoid lawsuits, provide custom software to drive the site, and make money from it?

H2K2 (2002): Bullies on the Net - The Ford and Nissan Cases
Saturday, July 13, 2002: 6:00 pm (Area "A"): We could fill the entire weekend with stories like these and we have no doubt there will be many more such tales in the years to come. With the help of agencies, corporations, treaties, and laws with acronyms like ICANN, WIPO, WTO, and the DMCA, the individual very often finds himself at the mercy of corporate giants with virtually unlimited funding - and seemingly unlimited power. Throughout it all however, there remains hope. Hear the story of Uzi Nissan, who is being sued by the Nissan Motor Company for daring to use his own name on the Internet. We'll also talk about how the Ford Motor Company sued 2600 - and lost.

Hosted by Emmanuel Goldstein, Eric Grimm, and Uzi Nissan

H2K2 (2002): How to Start an IMC in Your Town
Sunday, July 14, 2002: 10:00 am (Area "A"): At H2K, Jello Biafra urged attendees to become the media. Since then, many people have done just that. One of the most powerful tools in fighting the corporate media's stranglehold on information in this country has been the Indymedia network. Learn what's involved with becoming a part of Indymedia, the various hurdles and roadblocks you can expect to face, and how you can make a difference.

H2K2 (2002): Abuse of Authority
Sunday, July 14, 2002: 11:00 am (Area "A"): Over the years, there have been many stories in the hacker world of law enforcement personnel who have abused their authority. Two of the more dramatic cases in recent memory both come out of Philadelphia. Many of us are already familiar with the horror story of Bernie S. who toured five dangerous prisons for over a year - not because of what he was charged with - but because the United States Secret Service was upset about his collection of information about them. Then there is the case of ShapeShifter, 2600 layout artist, who was arrested at the Republican National Convention in 2000 (shortly after leading a panel on the RNC at H2K) and held on half a million dollars bail as if he were a terrorist mastermind - all because he had been targeted for speaking out in public. Hear the games the authorities play and how public education really can make a difference in putting an end to such abuse.

Hosted by Bernie S., ShapeShifter, and Alex Urbelis

H2K2 (2002): Lockpicking
Sunday, July 14, 2002: 12:00 pm (Area "A"): Barry "The Key" Wels returns from The Netherlands to provide details of some high security lock weaknesses and to demonstrate some state of the art techniques of exploiting them. He will tell the story of a company that had the famous line "Nobody can pick this lock" on their website. Of course, this was the ultimate motivation for the sport-lockpickers. This panel is where you can find out if a particular lock can be picked or not. Spare locks are always welcome, as TOOOL (The Open Organization of Lockpickers) is short of good locks. Also featuring Mike Glasser

H2K2 (2002): Human Autonomous Zones: The Real Role of Hackers
Sunday, July 14, 2002: 1:00 pm (Area "A"): How the role of hackers in society has changed. They used to be a necessary counterbalance to corporate and government power. Now, it's more like hackers are the only ones who understand the technology. They have become a balance to the power of technology itself. A discussion by renowned author Doug Rushkoff.

H2K2 (2002): Black Hat Bloc
Sunday, July 14, 2002: 2:00 pm (Area "A"): Hackers must deal with governments and ultimately the corporations that wield most of the decision making power within them. Looking over the past few decades of hacker interaction with corporations, we notice some interesting trends in the two worlds that indicate strong influences of the corporate and hacker worlds on the other's ethics and culture, often only hinted at to the rest of the world via biased corporate PR machines in the form of broadcast and publishing media. Hacker posts to Bugtraq become resumes, hacker tech like BBSes and IRC become the technical implementations of every Internet startup's business plan, hackers testify in front of Congress to warn them of impending doom directly resulting in increased federal cybercrime funding, while piracy is accepted by governments and media (but not the public) as theft. Has hacking become the fast venture capitalist track to shiny gadgets that go fast and make noise, a la Slashdot? Should we ignore intellectual property legislation and treaties that are passed solely to make rich people richer? This talk takes a look at where hacker/corporate/government relationships have been, where they are now, and where they could be going - hopefully shedding some light on everyone's motivations along the way.

Hosted by Gweeds

H2K2 (2002): The Ultimate Co-location Site
Sunday, July 14, 2002: 3:00 pm (Area "A"): Sealand was founded as a sovereign principality in 1967 in international waters, six miles off the eastern shores of Britain. The island fortress is conveniently situated from 65 to 100 miles from the coasts of France, Belgium, Holland, and Germany. HavenCo has been providing services since May 2000 and is fully operational, offering the world's most secure managed servers in the world's only true free market environment - the Principality of Sealand. Avi Freedman and Ryan Lackey of HavenCo will talk about the challenges and potential of this unique working environment and what it could mean to the future of the net.

H2K2 (2002): Social Engineering
Sunday, July 14, 2002: 4:00 pm (Area "A"): A tradition started at the first HOPE conference in 1994, the social engineering panel remains one of our most popular each and every time. It would be wrong for us to tell you what we have planned because then our victims might have a fighting chance of escaping. Suffice to say, we will find someone somewhere who will tell us something they really shouldn't have because they believed we were somebody we weren't. This panel is always open to participants so if you feel you're worthy, just let us know during the conference and you might find yourself up on stage trying to be clever on the phone.

Hosted by Emmanuel Goldstein, Bernie S., Cheshire Catalyst, and Alex Urbelis

H2K2 (2002): Hacking the Invisible World
Sunday, July 14, 2002: 5:00 pm (Area "A"): Everything you could possibly want to know about the workings of scanners, frequency counters, intercepting/spoofing RF A/V feeds, STL's, pagers, infrared signs, night vision, electronic surveillance, etc.

Hosted by Craig Harkins, Bernie S., and Barry "The Key" Wels

H2K2 (2002): Domain Stalking
Sunday, July 14, 2002: 6:00 pm (Area "A"): Ever wanted to legally have a $900 million dollar company in your debt? Intellectual property is a big deal to a lot of companies (witness the 2600 vs. Ford case) and it can be very easy to legally screw with it. This presentation will be a discussion of how easy it can be to get a company in your debt by simply watching their domains and catching them when they neglect to renew. It's a bigger problem with large companies than you think and can be exploited for many good causes. Hear how everyone from Symantec to the Red Cross to Jello Biafra has benefited from RenderMan's watchful eyes. Hosted by Renderman and Paul Garrin

H2K2 (2002): H2K2 Closing Ceremonies
Sunday, July 14, 2002: 7:00 pm (Area "A"): A final review of the events of the weekend along with all kinds of guests, giveaways, and more. Remember, only wimps leave early.

H2K2 (2002): The Shape of the Internet: Influence and Consequence
Friday, July 12, 2002: 10:00 am (Area "B"): Network researchers have discovered strong power law relationships in the Internet. These can be interpreted as a direct fingerprint of the fractal structure present on the net. Work has only recently begun on analyzing the implications of such a structure on attack tolerance, government snooping, and the like. In this talk, a review of these topics will be presented, along with a proposed network structure that can avoid such issues.

Hosted by Javaman

H2K2 (2002): Teaching Hacker Ethics with a Common Curriculum
Friday, July 12, 2002: 11:00 am (Area "B"): An introduction of a new proposed curriculum guideline for teaching information ethics to students in elementary school, high school, and college. This curriculum is being proposed through the North Carolina chapter of Computer Professionals for Social Responsibility. The idea is to foster creative, exploratory, effective, and intelligent use of information tools (aka, the hacker ethic), rather than powerless end-user mentality. There are many reasons to desire a common suggested curriculum for different educational levels. We might argue that most major advances in computing were brought about by hackers. We could point out that it's necessary to encourage creative and exploratory behavior for the next generation of computer users to do brilliant things. For today's hackers, the goal is simply to shape tomorrow's hackers so that they will use their abilities to help create a better society.

Hosted by Greg Newby

H2K2 (2002): Crypto for the Masses
Friday, July 12, 2002: 12:00 pm (Area "B"): This panel will approach cryptography from the perspective of enabling a "digital world" where key social schemes are preserved - personal identity, anonymity, and the right to privacy. We'll talk about the basic inner workings of cryptosystems, and discuss how they can be applied now to create and enforce cyber rights. We'll also discuss the hurdles faced by crypto and its adopters, along with the public at large. And we'll learn just how crypto is being threatened and abused by certain global goons.

Hosted by Matt Blaze, Greg Newby, Anatole Shaw, and Lucas Gonze

H2K2 (2002): Technomanifestos: Visions of the Information Revolutionaries
Friday, July 12, 2002: 1:00 pm (Area "B"): Author Adam Brate discusses the seminal works of the information age, from Norbert Wiener's Cybernetics to Abbie Hoffman's Steal This Book to Richard M. Stallman's GNU Manifesto, uncovering the remarkable stories behind the beginnings of the personal computer and the Internet and how they are changing society.

H2K2 (2002): Caller ID Spoofing
Friday, July 12, 2002: 2:00 pm (Area "B"): A demonstration of how Caller ID works as well as methods that can be used to emulate and display spoofed Caller ID messages on Caller ID and Caller ID with Call Waiting boxes using a Bell 202 modem. Details on the technical aspects such as Caller ID protocol for both regular and Call Waiting Caller ID. If all goes well, you may actually see a live demonstration of spoofed Caller ID.

Hosted by Lucky225 and Tray Smee

H2K2 (2002): Strategic Thought in Virtual Deterrence and Real Offense: The Computer's Role
Friday, July 12, 2002: 3:00 pm (Area "B"): Computers are pivotal components in modern society: daily life, banking, and military. What must be considered and what risks do we all face when they are used in conflict? These concerns are societal in nature and apply to both "minor" and "major" groups, governments, and militaries. There will be opportunity for ample questions from the audience. The intention is to share the overall attendee perspective. The goal is to be thought provoking, not scare-mongering.

Hosted by Wanja Eric Naef and Sam Nitzberg

H2K2 (2002): Magic Lantern and Other Evil Things
Friday, July 12, 2002: 4:00 pm (Area "B"): A talk by Rudy Rucker Jr. on the BadTrans worm and the FBI's Magic Lantern software. Both of these pieces of software are very similar and install keystroke logging software on clients' machines. Rucker has collected a couple of gigabytes of the BadTrans data and will explain how he parsed it and created a web-based tool for people to browse the database.

H2K2 (2002): "I Am Against Intellectual Property"
Friday, July 12, 2002: 5:00 pm (Area "B"): In the words of host Nelson Denoon: "Quit fucking apologizing for filesharing. Intellectual property is evil, filesharing is freedom fighting, and the sooner Jack Valenti is bumming quarters for a living, the better. The question is not how to protect artists, it is how to muster enough force to protect the right to hack."

H2K2 (2002): Tracking Criminals on the Internet
Friday, July 12, 2002: 6:00 pm (Area "B"): How certain criminal investigations have been investigated in the past couple of years with perps being tracked by IP addresses, email, and web surfing. Such cases include the murder of Daniel Pearl, the search for Bin Laden, the Melissa virus release, the Clayton Lee Waagner escape, the anthrax attacks, and the Wakefield mass murders.

Hosted by Richard M. Smith

H2K2 (2002): Magical Gadgets
Friday, July 12, 2002: 7:00 pm (Area "B"): Rewind to an age when electronics had originality; the era when a new product was inspired by creativity. Get the story about the evolution of IC-based devices, and see for yourself how the soul of electronics has been sold out.

Hosted by Jay Hanson and Paul Zurek

H2K2 (2002): Freedom: File Not Found
Friday, July 12, 2002: 8:00 pm (Area "B"): Since the explosion of the world network in the early 1990's, visionaries and pundits have been promising that "information wants to be free" and the web's free exchange of knowledge and ideas would be a liberating political and economic force throughout the world. It's been almost ten years now: where is this newfound freedom, especially in places like China? The Middle East? What about right here at home? This talk will discuss government/corporate efforts to restrict the free flow of information on the Internet and the political, ethical, and socioeconomic consequences. Topics will include hardware in use by the People's Republic of China to monitor and censor information it deems "subversive," routing tactics in Saudi Arabia to enhance government oversight and censorship, and the constitutionality of email snooping hardware and software in use in America. A Q&A session will follow.

Hosted by Bryan Maloney and Alan Brown

H2K2 (2002): The Argument Against Security Through Obscurity
Saturday, July 13, 2002: 10:00 am (Area "B"): In the world of networked computers, security through obscurity is generally ineffective. Hiding algorithms, protecting source code, and keeping procedures secret might be effective initially, but eventually the cloak of secrecy is penetrated. This talk will examine how security through obscurity is relied upon in the non-computerized world. When can security through obscurity work? What risk analysis should we use to examine the role of obscurity in the non-computerized world? The talk will present and examine the hypothesis that an "open source" mentality should be applied to security procedures for public places. This is a logical extension of the lesson in cryptanalysis - that no cryptographic method can be considered trustworthy until it has undergone a rigorous examination by qualified persons. Similarly, can we trust security procedures in the physical world designed, ostensibly, to protect the public if these procedures never undergo public scrutiny?

Hosted by Greg Newby

H2K2 (2002): Access Control Devices
Saturday, July 13, 2002: 11:00 am (Area "B"): There are all kinds of access control devices that we come in contact with every day. They include such things as magnet readers, proximity card readers, fingerprint readers, camera systems, biometrics, and basic standard operating procedures for a business. This talk will be a comprehensive guide to what's out there.

Hosted by Mike Glasser and Izaac Falken

H2K2 (2002): Hardware Q&A
Saturday, July 13, 2002: 12:00 pm (Area "B"): Explore a different form of hacking and interface directly with fellow electronics enthusiasts. Javaman and Binary will try to answer any questions related to hardware and electronics including but not limited to hardware tokens, radio/wireless technologies, embedded systems, smart cards, and secure hardware design.

H2K2 (2002): Introduction to Computer Viruses
Saturday, July 13, 2002: 1:00 pm (Area "B"): Understanding the fundamentals of how to identify, remove, and defend against hostile code. Robert Lupo and Marty will cover how different computer viruses work - boot sector, file infector, multi-parti, VBS, Java, the different OS viruses, etc. They will also explain how to remove different computer viruses with and without anti-virus software and discuss the future of computer viruses and hostile code.

H2K2 (2002): The Password Probability Matrix
Saturday, July 13, 2002: 2:00 pm (Area "B"): A winnowing method for brute-force password cracking using lossy compression. Cryptologist Jon Erickson will present the specifics for a newly developed password cracking method and perform a demonstration of it. The method is a hybrid between using computational power and storage space for an exhaustive brute-force attack utilizing a compressed matrix of probabilistic values. He will demonstrate the ability to crack any 4 character password with a fixed salt in under 8 seconds (assuming 10,000 cracks per second), using only a 141 meg file. A normal exhaustive brute-force on the same system would take over 2 hours, and flat text storage of the plaintext/hash pairs would normally use over a gigabyte of storage. This translates to 99.9% keyspace reduction and 89% storage compression.

H2K2 (2002): Hacking for Community Radio
Saturday, July 13, 2002: 3:00 pm (Area "B"): The technical and political struggle to take back the airwaves for the community. A panel discussion about the attempt to build linux based free software that can stream broadcast quality audio over the Internet from a studio to a transmitter site. In addition, there will be discussion on attempts to use wireless ethernet to shoot broadcast quality audio across town with high gain antennas and 2.4 gigahertz amplifiers.

Hosted by Pete Tridish from the Prometheus Radio Project, Josh Marcus, Dave Arney, and K. Clair from the Genderchangers.

H2K2 (2002): Secure Telephony: Where ARE the Secure Phones?
Saturday, July 13, 2002: 4:00 pm (Area "B"): Panel participants will take a look at the history of secure phones, what's worked and what hasn't, who the players are, and what needs to happen to make truly secure telephony a ubiquitous reality. Panel members include former Starium CTO Eric Blossom and Rop Gonggrijp of NAH6.

H2K2 (2002): Face Scanning Systems at Airports: Ready for Prime Time?
Saturday, July 13, 2002: 5:00 pm (Area "B"): A talk about the technical problems of face scanning systems being used at airports to pick out terrorists. Will these systems work like the promoters are claiming they will? Or will they fail to catch terrorists and instead turn our airports into round-up zones for petty criminals?

Hosted by Richard M. Smith

H2K2 (2002): Protection for the Masses
Saturday, July 13, 2002: 6:00 pm (Area "B"): Host Rop Gonggrijp gives updates on two projects designed to help people protect their privacy from prying eyes. One is a localhost mail proxy for PGP that is really nice and could "save the world" as the PGP plugins stop working (soon...). The other one is Secure Notebook, a project to create a notebook which runs Windows, yet is secure against theft. Source for all projects will be open for review.

H2K2 (2002): Hacking National Intelligence: Possibilities for a Public Intelligence Revolution
Saturday, July 13, 2002: 7:00 pm (Area "B"): Robert David Steele, author of two books on intelligence reform and sponsor of the Council on Intelligence, will provide a briefing on the state of the world, 21st Century tradeoffs that are NOT being made by our elected leaders, and how citizens can take back the power by practicing the new craft of intelligence to monitor and instruct their elected officials on key national security decisions. Among other major aspects, this would translate into a freezing of the Pentagon budget at $250 billion a year and redirection of $150 billion a year toward global education, public health, water and energy conservation, and "soft power" options including diplomacy and information peacekeeping, a term Steele devised in the early 1990's. Special guest: Aukai Collins

H2K2 (2002): Fun With Pirate Radio and Shortwave
Sunday, July 14, 2002: 10:00 am (Area "B"): Too few people take the time to appreciate shortwave radio. Even fewer have the opportunity to appreciate pirate radio. Here's your chance to learn more about these fascinating subjects. Allan Weiner will talk about his days operating Radio New York International, a famous pirate station from the 80's that served the New York area before it was raided by federal authorities in international waters. (We have no idea how the feds got away with that.) Today Weiner operates shortwave station WBCQ - along with chief engineer Timtron - which serves nearly the entire western hemisphere from studios in Maine. Craig Harkins joins the panel to talk of his experiences operating Anteater Radio during much of the 90's from an 18-wheeler truck. He received international acclaim from listeners while consistently evading American and Canadian radio police.

Hosted by Craig Harkins, Allan Weiner and Tim Smith

H2K2 (2002): Digital Demonstrations: Criminal DDoS Attack or Cyber Sit-in?
Sunday, July 14, 2002: 11:00 am (Area "B"): Being able to carry political opinions to the public by showing them on the street is a basic part of democratic rights. Nowadays, a steadily increasing part of our life takes place in cyberspace. Things which aren't happening in cyberspace will therefore get less and less public attention. How can protest be taken into the virtual realm? What strategies for "online demonstrations" have we seen so far? How about the ethical and legal dimensions? Who gets hurt? Host Maximillian Dornseif will present a new approach for conducting online demonstrations without adversely affecting other users on the net.

H2K2 (2002): Conspiracies
Sunday, July 14, 2002: 12:00 pm (Area "B"): Technology can be a wonderful thing, but it can be quite harmful as well. Unenlightened corporate interest as well as government interest can make for some savage bedfellows. This panel will deal with technology, its good uses and some of its evil ones.

Hosted by Gonzo, Leo, Jeffrey Smith, Cisco, and Conspiracy Bob

H2K2 (2002): Open Source Security Testing Methodology Manual
Sunday, July 14, 2002: 1:00 pm (Area "B"): The OSSTMM came about as a need for an open, free security testing methodology in response to the numerous security testing companies who claimed to have a secret, internal, and corporate confidential methodology for testing. It was this methodology that they used to differentiate themselves from other testing companies. The problem was that often it didn't exist and the tests turned out to be no more than commercial scanners set loose on a list of systems. The development of the OSSTMM began as a series of logical steps to make a good test and grew into the need to make the most thorough test. This presentation will show the origin of the OSSTMM and the logic behind it, as well as results of reverse-engineering the reports of corporate tests, commercial tools, and commercial presentations.

Hosted by Tyler Shields

H2K2 (2002): GNU Radio: Free Software Radio Collides with Hollywood's Lawyers
Sunday, July 14, 2002: 2:00 pm (Area "B"): The GNU Radio project is building a platform for experimenting with software radios - systems where the actual waveforms received and transmitted are defined by software, not special purpose hardware. One of their projects is building an all-software ATSC (HDTV) receiver. An all-software free ATSC receiver would allow among other things the construction of the mother of all "personal video recorders." Think Tivo or Replay on steroids. The folks from the Broadcast Protection Discussion Group (BPDG) have other ideas. They'd like to lock up the cleartext signal and make sure that only members of their club would be allowed to build receivers, modulators, and storage devices for digital TV. A discussion of where this is all likely to head. Panel participants include GNU Radio technical representative Eric Blossom and Lodrina Cherne from the EFF.

H2K2 (2002): The Patriot Act
Sunday, July 14, 2002: 3:00 pm (Area "B"): Members of the New York City People's Law Collective will be discussing the dangers of the Patriot Act and providing information on warrants, hacktivism, what is legal and what is not, and ways that hackers, activists, and normal citizens can protect themselves from The Man.

H2K2 (2002): Hacking Nanotech
Sunday, July 14, 2002: 4:00 pm (Area "B"): Nanofabrication technology is an up and coming field that will revolutionize the way humans live on a day to day basis. Host Jim "Cipz" tells what the future projections about nanofabrication are - things like robots so small you would need an electron microscope to see them. There will also be an examination of some amazing achievements that have been accomplished already as well as an analysis of the possible ethical problems that may arise with nanofabrication in the future.

H2K2 (2002): Report From Ruckus
Sunday, July 14, 2002: 5:00 pm (Area "B"): Very recently, history was made in California as The Ruckus Society held its first-ever Tech Toolbox Action Camp. It lasted for a week and brought together geeks and activists from around the world who shared information on how they're using the Internet and other technologies in working for change. Part of the goal was to emerge from this and show others what they learned. Some of the attendees of the Ruckus Camp will be here to do just that.

H2K2 (2002): Proximity Cards: How Secure Are They?
Sunday, July 14, 2002: 6:00 pm (Area "B"): They're used everywhere but they could be making you even more vulnerable to privacy invasion. Delchi has been working with proximity based card systems for two years and has developed a method of casually extracting data from proximity cards in a public environment. Riding in an elevator, subway, or just walking down the hall, a person can bump into you, say "excuse me," and walk away with the decoded information from the proximity card in your pocket. It could then be possible to build a device that can capture and replay these snippets of information on demand or to even brute force a proximity card system. This talk will focus on the vulnerabilities of the systems and show a low power working prototype. Alternatives will be discussed, as well as other vulnerable aspects of proximity based building and computer access systems.

H2K2 (2002): Negativland - Past, Present, Future
Saturday, July 13, 2002: 8:00 pm (Area "D"): If there is any one group who personifies the concept of "fair use," that group would have to be Negativland. The Bay Area based band has, over the years, drawn the ire of everyone from rock band U2 to American Top 40 host Casey Kasim to angry parents to confused legislators. Founding member Mark Hosler hosts this presentation which will focus on media literacy as well as the activism, pranks, and hoaxes that Negativland has engaged in over the years. A number of rare Negativland films will also be shown.

H2K2 (2002): Jello Biafra's State of the World Address
Saturday, July 13, 2002: 10:00 pm (Area "D"): Since his keynote address at the H2K conference in 2000, Jello Biafra has witnessed further corporate consolidation and censorship of mass media. He's also been on the front lines of the growing uprising against corporate power itself. He may speak about that, and/or the Bush mob's cynical exploitation of the tragedy on September 11, or the corporate music biz convention on "the future of digital music" he was invited to speak at a few days before H2K2. He's not sure yet so stay tuned.

[NOTE: Video is missing from the middle of this talk, however we were able to salvage audio for that section.]

H2K2 (2002): "Freedom Downtime" Question & Answer Session
Sunday, July 14, 2002: 3:00 am (Area "D"): This is a brief question and answer session that followed the screening of "Freedom Downtime" late Saturday night. Hosted by Michael Kaegler and Gus Gustafson.

Producer 2600 The Hacker Quarterly
Audio/Visual sound, color


There are no reviews yet. Be the first one to write a review.
Uplevel BACK
Uplevel BACK
Uploaded by
on 12/19/2012
SIMILAR ITEMS (based on metadata)
by 2600 The Hacker Quarterly
eye 1,219
favorite 1
comment 0
by 2600 The Hacker Quarterly
eye 860
favorite 0
comment 0
by 2600 The Hacker Quarterly
eye 982
favorite 1
comment 0
by 2600 The Hacker Quarterly
eye 3,547
favorite 2
comment 0
by 2600 The Hacker Quarterly
eye 1,082
favorite 3
comment 0
by CarolinaCon
eye 29
favorite 0
comment 0
by AthCon
eye 50
favorite 0
comment 0
by CarolinaCon
eye 44
favorite 0
comment 0
by CarolinaCon
eye 60
favorite 0
comment 0
by CarolinaCon
eye 36
favorite 0
comment 0